Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Trojan.Cryptolocker.X Variant or Winconfo.exe Detection and Removal

NameTrojan.Cryptolocker.X
TypeRansomware, Trojan
Short DescriptionMay encrypt important files and give decryption keys upon paying ransom which is usually financial compensation.
SymptomsAppearing of different objects in various user folders or the Desktop or on startup. Files encoded with unfamiliar extensions
Distribution MethodSpam mails. MiTM attacks, malicious redirects.
Detection toolDownload SpyHunter, to See If Your System Has Been Affected By Trojan.Cryptolocker.X
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

p10_0000Another variant has been added to the multi-variation ransomware trojan, called Trojan.Cryptolocker. It is also going by the names of Trojan.Gpcoder, CryptLocker, Win32/Crilock, TROJ_CRILOCK.NS, Trojan,Ransomcrypt and is a devastating encryption Trojan. What this threat does is a new form of cyber extortion – it scans for user data only to encrypt important files and ask for ransom funds promising their return. However, online security experts advise not to cope with the ransom demands since the cyber criminals have no guarantees what so ever of the safety of your files.

Trojan.Cryptolocker.X – Description and Activity

This variant is very similar to the other Trojan.Cryptolocker types (.E, .N, .F, .P, .W, .U, .R, .V) mainly due to the fact that they encrypt user files with a strong encryption and make them inaccessible. After encryption, Windows may say ‘Your files are corrupt’ or anything of this similarity. In this particular case of variant X, the current actions and objects associated with them were reported in Symantec researchers’ technical report:

1-After the Trojan has been initiated in the user PC, it creates an executable file, going by the name of

winconfo.exe.

2-The file may run various scripts, since after being started it is reported to display this pop-up:

“ERROR 7×000000 There was an error opening this document. The file is damaged and could not be repaired”

3-After execution, the file is being deleted.

4-The next step is to conceal the threat. This happens by running a so-called mutex that allows file access. The mutex is reported to be called:

888roddddsjk_Alreee3ady_888nt.

5-The trojan begins to scan and look for documents, pictures and other file formats. It targets these file types:

.3ds .3fr .3pr .7z .ab4 .accdb .accde .accdr .accdt .adb .ai .ait .al .apj .asp .awg .backup .backupdb .bak .bdb .bgt .bik .bkp .blend .bpw .cdf .cdr .cdr3 .cdr4 .cdr5 .cdr6 .cdrw .cdx .ce1 .ce2 .cer .cfp .cgm .cib .cls .cmt .cpi .crt .csh .css .csv .dac .db .db3 .dbf .db-journal .dc2 .dcr .dcs .ddd .ddoc .ddrw .der .design .dgc .djvu .dng .doc .docm .docx .dot .dotm .dotx .drf .drw .dwg .dxb .erbsql .erf .exf .fdb .ffd .fff .fh .fhd .fpx .fxg .gray .grey .gry .hbk .hpp .ibank .ibz .idb .idx .iiq .incpas .jpeg .JPEG .jpg .JPG .js .kc2 .kdbx .kdc .kpdx .lua .mdb .mdc .mef .mfw .mmw .moneywell .mos .mp3. .mpg .mrw .myd .ndd .nef .nop .nrw .ns2 .ns3 .ns4 .nsd .nsf .nsg .nsh .nx1 .nx2 .nyf .odb .odf .odg .odm .odp .ods .odt .orf .otg .oth .otp .ots .ott .p12 .p7b .p7c .pat .pcd .pdf .pef .pem .pfx .php .pl .pot .potm .potx .ppam .pps .ppsm .ppsx .ppt .pptm .pptx .ps .psafe3 .psd .ptx .ra2 .raf .rar .raw .rdb .rtf .rw2 .rwl .rwz .s3db .sas7bdat .sav .sda .sdf .sdo .sldm .sldx .sqlite .sqlite3 .sqlitedb .sr2 .srf .srw .st4 .st5 .st6 .st7 .st8 .stc .std .sti .stw .stx .sxc .sxd .sxg .sxi .sxm .sxw .txt .wb2 .x3f .xla .xlam .xll .xlm .xls .xlsb .xlsm .xlsx .xlt .xltm .xltx

After it has encrypted the files, the trojan proceeds to the final stage – leaving a ransom note with demands to the victim. This happens by creating the following objects on the computer:

-Trojan [email protected]
-Trojan [email protected]
-pronk.txt
-help-file-decrypt.enc

The “pronk.txt” file contains a ransom note that says which files belonging to the user have been encrypted along with instructions to contact the attackers via email. Most ransomware horses utilize the anonymous Tor browser that gives the attackers the convenience of staying anonymous.

How Did I Become Infected With Trojan.Cryptolocker.X?

Different means of infections exists when it comes to this trojan horse. One of them is a direct execution of the file by another person on the computer. So if you have other people that may have accessed your PC without permission, you might want to restrict any further access in the future. More to it than that, there is a method, called spoof mailing. It involves an email from your boss with an infected attachment, for example. But the sender address is only disguised to be your boss by special software. In reality, these attacks happen only when the attacker has access to the inner network. This is why to prevent spoof mailing, always use a mail program, such as Microsoft Outlook or Mozilla Thunderbird for example.

Also, you may have opened a spam mail. Spam mails have a lot of attachments in them, and they also could carry different malware, including ransomware trojan, like this one. Another method of infection is if you have an adware program on your computer, otherwise known as PUPs. These unwanted apps may sometimes cause redirects to sites that either directly inject malicious code onto the user PC or prompt the download of the malware in the form of a fake Java or Flash update or a game or any other installer. When it comes to infection files, the possibilities go as far as your imagination.

How To Remove Trojan.Cryptolocker.X?

To get rid of this .trojan make sure you immediately disconnect from the internet so you can isolate the threat and limit it only to your PC. After that, you may want to boot to a live OS, by using live OS creation image and bootable drive making tool, such as Rufus, for example. You can also boot into a safe mode without networking it will have a similar effect if the trojan hasn’t modified any settings that prevent you from booting. After the threat has been isolated it is recommended to download advanced malware scanner and registry cleanup tool that will detect and remove all objects associated with this menace.

After you have cleaned up the threat, try to check if you have made a backup of your files. If not, look for a decryptor software online. However, your chances may be very small. This is because it may take from hours to years, depending on the strength of the encryption and the algorithm itself. Also, make sure to watch the after-mentioned instruction video to help you with backing up your files so you can protect yourself from further ransomware infections in the future.

Ransomware protection video and instructions:

donload_now_250
Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter

1. Start Your PC in Safe Mode to Remove Trojan.Cryptolocker.X
2. Remove Trojan.Cryptolocker.X automatically with Spy Hunter Malware - Removal Tool.

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.